Knudsen, Lars R. and Mitchell, Chris J (2005) Partial key recovery attack against RMAC. Journal of Cryptology, 18 (4).
Full text access: Open
In this paper new “partial” key recovery attacks against the RMAC block cipher based Message Authentication Code scheme are described. That is we describe attacks that, in some cases, recover one of the two RMAC keys much more efficiently than previously described attacks. Although all attacks, but one, are of no major threat in practice, in some cases there is reason for concern. In particular, the recovery of the second RMAC key (of k bits) may only require around 2k/2 block cipher operations (encryptions or decryptions). The RMAC implementation using triple DES proposed by NIST is shown to be very weak.
This is a Submitted version This version's date is: 2/2005 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/a8611a34-e2c9-da3a-fc87-5d9e6a4a38f8/2/
Deposited by Research Information System (atira) on 24-May-2012 in Royal Holloway Research Online.Last modified on 24-May-2012
The original publication is available at www.springerlink.com Copyright 2005 Springer Verlag.